Skip to Main Content
ASME Press Select Proceedings

International Conference on Information Technology and Computer Science, 3rd (ITCS 2011)

Editor
V. E. Muhin
V. E. Muhin
National Technical University of Ukraine
Search for other works by this author on:
W. B. Hu
W. B. Hu
Wuhan University
Search for other works by this author on:
ISBN:
9780791859742
No. of Pages:
656
Publisher:
ASME Press
Publication date:
2011

Since the first (t,n) threshold proxy signature scheme was proposed, the threshold proxy signature has enjoyed a considerable amount of interest from the cryptographic research community. But most of existing threshold proxy signature schemes were pointed out some weaknesses, which were vulnerable to the well-known attacks, such as frame attack, public-key substitute attack, warrant attack, collusion attack and so on. In this paper, we propose a novel threshold proxy signature scheme, which can resist the attacks as mentioned above. Furthermore, compared to existing threshold proxy signature schemes based on discrete logarithms, our scheme is more efficient than them.

Abstract
Keywords
1. Introduction
2. Our Scheme
3. Discussions
4. Conclusions
Acknowledgments
References
This content is only available via PDF.
Close Modal
This Feature Is Available To Subscribers Only

Sign In or Create an Account

Close Modal
Close Modal